Abstract

Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.

Highlights

  • Multimedia data manipulation has become more and more simple and undetectable by the human audible and visual system due to technology advances in recent years

  • We introduce two watermarking algorithms: our first approach is a content-fragile watermarking scheme combining fragile feature extraction and robust audio watermarking, and the second approach is designed to detect each bit change and reconstruct the original audio, where we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original protected with a secret key

  • As multiple hash functions are available and the length of the RSA signature is key dependent, the capacity requirements are calculated as follows: (i) sync info, for example, 64 bit; (ii) two hash values: (a) remaining audio information, for example, 256 bit, (b) selected bit layer, for example, 256 bit; (iii) RSA digital signature, for example, 512 bit; (iv) compressed bits are encrypted by a symmetric key scheme (AES), that is, adding max. 63 bits

Read more

Summary

INTRODUCTION

Multimedia data manipulation has become more and more simple and undetectable by the human audible and visual system due to technology advances in recent years. For high-security application, we have the requirement to detect each bit change in an audio track and to extract the watermark embedded as additional noise Invertible schemes face this problem and have been introduced for image and video data in recent publications [8]. We introduce two watermarking algorithms: our first approach is a content-fragile watermarking scheme combining fragile feature extraction and robust audio watermarking, and the second approach is designed to detect each bit change and reconstruct the original audio, where we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original protected with a secret key. While previous data authentication watermarking schemes address a single media stream only, the paper discusses the requirements of multimedia protection techniques, where the authors introduce a new approach called 3D thumbnail cube. The main idea is based on a 3D hologram over continuing video and audio frames to verify the integrity of the a/v stream

Feature-based authentication concept: content-fragile watermarking
Invertible concept
Content-fragile authentication concept
Digital audio features
Feature checksums
Test results
INVERTIBLE AUDIO WATERMARKING
Compression techniques and capacity evaluation
APPLICATIONS
News data authentication
Surveillance recordings
Forensic recordings
CD-master protection
Findings
SUMMARY AND CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.